Module2 PTP
Module2 PTP
To control and manage the transfer of data, there is a need for a point-to-point protocol at the data-link
layer. Internet users who need to connect their home computers to the server of an Internet service
provider use PPP.
Framing
PPP uses a character-oriented (or byte-oriented) frame.
Transition Phases
Multiplexing
PPP is a link-layer protocol, it uses another set of protocols to establish the link, authenticate the parties
involved, and carry the network-layer data.
Three sets of protocols are defined to make PPP powerful:
Link Control Protocol (LCP),
Authentication Protocols (APs),
several Network Control Protocols (NCPs).
Protocol values: LCP : 0xC021
AP: 0xC023 and 0xC223
NCP: 0x8021 and ....
Data: 0x0021 and ...
Authentication Protocols
Authentication plays a very important role in PPP because PPP is designed for use over dial-up links where
verification of user identity is necessary. Authentication means validating the identity of a user who needs
to access a set of resources.
PPP has created two protocols for authentication:
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol. (CHAP)
PAP
The Password Authentication Protocol (PAP) is a simple authentication procedure with a two-step
process:
a. The user who wants to access a system sends an authentication identification
(usually the user name) and a password.
b. The system checks the validity of the identification and password and either accepts or denies
connection.
Figure 11.24 shows the three types of packets used by PAP and how they are actually exchanged. When a
PPP frame is carrying any PAP packets, the value of the protocol field is 0xC023. The three PAP packets
are authenticate-request, authenticate-ack, and authenticate-nak. The first packet is used by the user to
send the user name and pass-
word. The second is used by the system to allow access. The third is used by the system to deny access.
CHAP
The Challenge Handshake Authentication Protocol (CHAP) is a three-way hand- shaking authentication
protocol that provides greater security than PAP. In this method, the password is kept secret; it is never
sent online.
a. The system sends the user a challenge packet containing a challenge value, usually a few bytes.
b. The user applies a predefined function that takes the challenge value and the user’s own password and
creates a result. The user sends the result in the response packet to the system.
c. The system does the same. It applies the same function to the password of the user (known to the
system) and the challenge value to create a result.
Network Control Protocols
PPP is a multiple-network-layer protocol.
IPCP
One NCP protocol is the Internet Protocol Control Protocol (IPCP). This protocol configures the link
used to carry IP packets in the Internet.
Multilink PPP
PPP was originally designed for a single-channel point-to-point physical link. The availability of multiple
channels in a single point-to-point link motivated the development of Multilink PPP. In this case, a logical
PPP frame is divided into several actual PPP frames.
Example
Let us go through the phases followed by a network layer packet as it is transmitted through a PPP connection.
Figure 11.29 shows the steps. For simplicity, we assume unidirectional movement of data from the user site to
the system site (such as sending an e-mail through an ISP).